• Classroom
  • Online, Instructor-Led
Course Description

This course provides an overview of security issues in database systems and shows how current and future commercial systems may be designed to ensure secrecy and confidentiality. Security models, basic security mechanisms and software, database security, intrusion detection and security models for next generation databases are covered.

Learning Objectives

  • Student will demonstrate an understanding of the fundamental security concepts and architectures that serve as building blocks to database security. Also examined are the security components of operating systems, including system vulnerabilities and password policies, and file permissions.
  • Student will learn the concepts of user account management and administration, including security risks of which the administrators must be aware using Oracle and Microsoft's SQL Server. The student will also learn best practices for user and account administration.
  • Student will be able to use a current database management system to design and configure the user and data permissions that will establish database access controls, including roles, profiles, policies, privileges, and rules.
  • Student will learn the operational components necessary to maximize database security using various security models as applied to various application system architectures. This will include the integration of DBMS security with client/server models, web applications, application servers, and general operations.
  • Student will learn principles of data encryption and will explore issues and limitations associated with implementing encryption policies for relational databases.
  • Student will learn to implement a Virtual Private Database using the Oracle and SQL Server RDBMS that limits user access to certain columns and rows and the application contexts for implementing this business requirement.
  • Student will learn the auditing environment, process, objectives, classifications, and types of database auditing possible. This will include the potential side effects of implementing auditing policies on database performance and security administration.
  • Understand how triggers and stored procedures assist with the enforcement of database security and data integrity.

Framework Connections

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.